Cybersecurity

3 Hacking Tools Exposed – Rubber Duckies

Malicious threat actors have a deadly arsenal of tactics that can be used to breach your companies defenses and cause a lot of harm for a business and their clients.…

Read more

3 Hacking Tools Exposed – Bash Bunny

Malicious threat actors have a deadly arsenal of tactics that can be used to breach your companies defenses and cause a lot of harm for a business and their clients.…

Read more
3cx-Warns-Customers

Disable SQL Database Integrations 3cx Warns Customers

3CX is warning its customers to disable any SQL database integrations due to potential risks that they describe as a potential vulnerability. even though the security advisory released by 3cx…

Read more
3 Hacking Tools Exposed

3 Hacking Tools Exposed – WiFi Pineapples

Malicious threat actors have a deadly arsenal of tactics that can be used to breach your companies defenses and cause a lot of harm for a business and their clients.…

Read more
06.12.2023-Threatlocker-Holiday-Season

Threatlocker Zero Keeping You Safe During The Holiday Season

Threatlocker is a zero trust protection platform. This platform provides enterprise level cyber security. With this platform you can allow only what you need to have on your systems and…

Read more
08.12.2023-Space-Telescopes

Mysterious Threat Actor Targeting Space Telescopes

Work at the Gemini North Telescope in Hawaii and Gemini South Telescope in Chile, had to halt operations due to a cyber attack. These attacks also disrupted a number of…

Read more
04.12.2023-Threatlocker

Threatlocker Zero Trust Success Story of Airiam

Threatlocker is a zero trust protection platform. This platform provides enterprise level cyber security. With this platform you can allow only what you need to have on your systems and…

Read more
What-Is-SOC-2

What Is SOC 2 Compliance In Terms Of Technology

Service Organization Control 2, known as SOC 2 for short, compliance in relation to technology has to do with how service organizations manage and secure customer data, in particular when…

Read more

Morris Worm In The Early Days Of the Internet Showed The Cyber Security Risks That Existed

In 1988 the internet was a simpler and friendlier place. No more than 100,000 computer were connected to the internet. At this time nobody considered that security measures such as a…

Read more
Eagle-Eye-T-Banner-Okta-breached-again

Okta breached again due to past breaches

Identity management platform Okta, on October 20th 2023, said it had suffered another breach in its customer support system. As a company that deals with access and authentication services, when…

Read more